Results 161 to 170 of about 154,141 (333)

Robust Multi-property Combiners for Hash Functions Revisited [PDF]

open access: green, 2008
Marc Fischlin   +2 more
openalex   +1 more source

Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

open access: yes, 2012
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire   +1 more source

Attacks on hash functions and applications

open access: yes, 2012
Cryptografische hashfuncties, of simpelweg hashfuncties, zijn een van de belangrijkste bouwstenen binnen de cryptografie. Een hashfunctie is een algoritme dat voor elk willekeurig bericht een korte hash-waarde van een vast aantal bits (bv. 256 bits) berekent. Zulke hash-waarden worden gebruikt als een soort van vingerafdruk om het originele bericht mee
openaire   +4 more sources

Development, external validation and integration into clinical workflow of machine learning models to support pre‐operative assessment in the UK

open access: yesAnaesthesia, EarlyView.
Summary Introduction Demand for surgical treatment is growing and patient complexity is increasing. The NHS England standard contract now requires that pre‐operative services risk stratify and optimise patients awaiting surgery. However, current pre‐operative workflows (whether electronic or paper‐based) remain based primarily on resource‐intensive ...
Alwyn Kotzé   +7 more
wiley   +1 more source

ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 2019
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj  

Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]

open access: yesSci Rep, 2018
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc   +1 more source

Hash functions for near duplicate image retrieval [PDF]

open access: green, 2009
Adrien Auclair   +2 more
openalex   +1 more source

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy